Search Results - (( process certification method algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- process certification »
- certification method »
- application matching »
- method algorithm »
- java application »
-
1
-
2
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
3
-
4
-
5
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
6
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Speech dereverberation enhancement
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
11
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…The proposed method removes the need for credentials, including client-server certificates and client-server key exchange.…”
Get full text
Get full text
Get full text
Proceeding -
12
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
Published 2019“…Furthermore, the cache-based scheduling algorithm was upgraded to improve the response time of user jobs. …”
Get full text
Get full text
Get full text
Article
